Cloud Infrastructures, Services, and IoT Systems for Smart Cities. Second EAI International Conference, IISSC 2017 and CN4IoT 2017, Brindisi, Italy, April 20–21, 2017, Proceedings

Research Article

eIDAS Public Digital Identity Systems: Beyond Online Authentication to Support Urban Security

  • @INPROCEEDINGS{10.1007/978-3-319-67636-4_7,
        author={Francesco Buccafurri and Gianluca Lax and Serena Nicolazzo and Antonino Nocera},
        title={eIDAS Public Digital Identity Systems: Beyond Online Authentication to Support Urban Security},
        proceedings={Cloud Infrastructures, Services, and IoT Systems for Smart Cities. Second EAI International Conference, IISSC 2017 and CN4IoT 2017, Brindisi, Italy, April 20--21, 2017, Proceedings},
        proceedings_a={IISSC \& CN4IOT},
        year={2017},
        month={11},
        keywords={Urban security Public digital identity eIDAS SPID Critical environments Physical access control},
        doi={10.1007/978-3-319-67636-4_7}
    }
    
  • Francesco Buccafurri
    Gianluca Lax
    Serena Nicolazzo
    Antonino Nocera
    Year: 2017
    eIDAS Public Digital Identity Systems: Beyond Online Authentication to Support Urban Security
    IISSC & CN4IOT
    Springer
    DOI: 10.1007/978-3-319-67636-4_7
Francesco Buccafurri1, Gianluca Lax1,*, Serena Nicolazzo1, Antonino Nocera1
  • 1: University Mediterranea of Reggio Calabria
*Contact email: lax@unirc.it

Abstract

The European regulation eIDAS introduces in EU States interoperable public digital identity systems whose native application is secure authentication on online services. In this paper, we try to offer an enhanced view of the potential benefits that such systems can have in our physical environments. Indeed, cities have seen a dramatic increase in the number of violent acts and crimes. The possibility of monitoring people access to physical critical places is certainly an important issue because this gives the possibility to deny the access to dangerous people, to find the offender of a crime, and, in general, to track suspicions activities. In this paper, we show how to exploit an eIDAS-compliant public digital identity system to meet the above requirements, thus offering a concrete solution with high level of interoperability.